Info tech final exam
Terms
undefined, object
copy deck
- music, art, literary works, software and movies
- what do copyrights protect?
- .zip
- compressed file
- trademark
- sign of a business or organization
- with user interaction
- how do viruses spread?
- word choice and sentence structure
- what does tone refer to in terms of emails?
- infectious malware
- viruses and worms
- patents
- rights that protect inventions
- Really Simple Syndication
- what does RSS stand for?
- encryption
- how do we secure wireless networks?
- radio waves
- what do we use to communicate on wireless networks?
- searching, fitting constraints, recognizing patterns, logical inferences
- what are the four methods of solving problems that make up AI
- blind carbon copy
- what does Bcc stand for?
- inadvertent and intentional
- what are the two types of plagiarism?
- input and output devices
- interact with and get feedback from
- searching
- finding answers based on reasoning and planning
- pop-ups, security holes, untrustworthy files, software with malware bundled in it
- what are ways we get malware?
- binary digit
- what does bit stand for?
- logical inferences
- finding answer by using reasoning, inductionm, and deduction
- storage device
- stores information
- an IT security device that will permit or deny traffic to protect our information
- what is a firewall and why do we have it?
- targeted advertising
- information is analyzed to present specific advertisements
- without user interaction
- how do worms spread?
- ascii
- used to translate words or letters into binary code
- filename
- file1.doc
- floppy drive-A; Hard drive-C; Network drive-H; USB drive-D
- what are the types of drives and their letters?
- reverse engineering
- studying things by taking them apart, and learning how they work
- network
- two or more computers connected together via a telecom system in order to share resources and information
- file extension
- helps identify what the file is and what program opens it
- password
- form of authentic data used to control access to a resource
- email flaming
- abusive messages
- war games and video games
- what is an example of logical inferences?
- fitting constraints
- finding answers based on what fits into the confined space
- hypertext markup language
- what does HTML stand for?
- computer
- programmable machine that stores, retrieves, and processes data
- podcasts
- media files that destributed by subscription using syndication
- online profiling
- websites that obtain as much information from the user as possible
- add, change, remove, edit
- what can be don to a wiki?
- fair use
- allows educators to use copyrighted work
- back-up our files
- why do we have drives and other media?
- hertz
- speed
- license
- permission given by the owner to use the work
- spam and phishing
- what are two things to be concerned with in email security?
- .mp3, .wav, .wma
- some audio file types?
- telephone number; unique
- describe an IP
- social media
- what are blogs and wikis types of?
- police face prints
- what is an example of fitting constraints?
- concealment
- trojan horses
- internet
- all smaller networks working together in the world
- search engine
- what is an example of searchng?
- .avi, .wmv, .mpg
- some video file types?
- what you see is what you get
- what does WYSIWYG stand for?
- malware and malicious people
- what do firewalls protect against?
- protect our computers by keeping out malware and block sites that go against our code of conduct
- why do we have filters?
- share resources, information and communicate
- why do we have computer networks in the world?
- operating system
- manages files systems, controls imput and output devices, and facilitates networking
- drive
- a device attached to a computer used to store various media
- webpage
- resource of information suitable for the world wide web accessed through a web browser
- copyrights
- rights that regulate an idea or expression
- controls where people go when they leave our network
- what do filters do?
- public domain
- work that isn't owned by anyone
- copy, distribute, display, modify, perform
- what are the five rights of copyrights?
- wired and wireless
- what are the two types of networks?
- aggregator
- software that is used to collect all syndicated feeds into one place
- both
- is a firewall software or hardware?
- location
- hard drive - C drive
- malware for profit
- spyware
- wiki
- website that allows visitor to add, change, remove, or edit
- privacy policy
- websites will indicate what information is taken and what they do with it
- cryptography
- study of message security
- Bcc
- hide recipients name and provide security for email addresses
- motherboard
- connects all parts together
- spam
- electronic junk mail
- blog
- user generated website with reverse chronological entries
- intellectual property
- product of the mind that are protected under law
- recognizing patterns
- finding answers by picking what matches the criteria
- phishing
- con game used to gain personal information
- Information Technology
- what does IT stand for?
- malware
- software designed to infiltrate or damage a computer system without a user's information consent
- cookies
- files that are placed on the computer to track your online habits
- bytes
- storage
- delete/destroy files, slow computer down, steal information, crash computers
- why are viruses and worms harmful?
- .jpg, .bmp, .gif, .png
- some picture files?
- digital rights management
- what does DRM stand for?
- collaborative software
- wikis use what type of software?
- artificial intelligence
- capacity of a computer to learn and make decisions in order to solve problems
- data
- what do telecomm systems send?
- Cc
- information purposes
- cyberbullying
- deliberate recurring harm through electronic messages
- access points
- how do we connect to SUA's network?
- path
- C:\temp
- dynamic and static
- what are the two types of content that webpages usually have on them?
- internet protocol
- what does IP stand for?
- WEO and WPA
- what are the two main types of wireless security?
- 8
- how many bits are in a byte
- addressing, audience, subject lines, open and close property, grammar, proofread, and watch sarcasm
- what are the guidelines for good etiquette?
- web feed
- format used to provide updated content
- file path
- C:\temp\file1.doc
- http; padlock icon
- how can you tell if a website is secure?
- Carbon Copy
- what does Cc stand for?
- neural networks
- what is an example of recognizing patterns?
- plagiarism
- taking the ideas of others and offering them as your own
- our information is vulnerable
- why do we have security on the internet?
- CPU
- brain of computer or does calculation
- domain name system
- what does DNS stand for?
- antivirus software
- how do we get rid of viruses and worms?
- encryption
- process of obscuring information to make it unreadable without special knowledge
- domain name
- how we refer to websites
- no
- are wireless networks secured by default?